SlideShare a Scribd company logo
1 of 2
Download to read offline
How to secure information systems?
Solution
Answer:
Information security:
Information security, sometimes shortened to InfoSec, is the practice of halting unauthorized
access, use, revelation, disordering, modification, investigation, recording or destruction of
information. It is a general term that can be used regardless of the form the data may take (e.g.
electronic, physical).
Since the advent of the internet and increased expansion of computer based technology in
today's corporations, information security breaches have increased at an alarming rate. While
businesses take a more cautious approach to how they handle IT security threats, these are
becoming increasingly complex and sophisticated. Denial-of-service attacks, software tampering
(e.g. Trojan horses and computer viruses) and social engineering techniques (e.g. phishing) are
some examples becoming prevalent. While we often times hear of the more widely publicized
embezzlement, money laundering, burglary and bribery statistics, data has shown that companies
have seen greater losses from losses attributed to information security breaches.
One of the most effective ways to prevent criminals from accessing and compromising
confidential company information is to implement an effective information security plan and
properly train firm employees accessing the system. Additionally, companies should implement
a dynamic and independent third party auditor to frequently test the adequacy of their security
system. Lastly, key responsibilities within the information security chain should be segregated
and rotated frequently. If companies follow these three basic tenets, they will be one step closer
to the effective security of their information.
Threats to Information Systems:
Information security threats come in many different forms. Some of the most common threats
today are software attacks, theft of intellectual property, identity theft, theft of equipment or
information, sabotage, and information infiltration Some of the most prevalent types of data
infiltration include input manipulation, program manipulation, data input manipulation, data
stealing, and outright sabotage. The most frequent type associated with this form of fraud is
manipulation of the data. The reason for this most common is because the criminal requires the
less amount of skill.
Most people have experienced software attacks of some sort. Viruses, worms, phishing
attacks, and Trojan horses are a few common examples of software attacks. Governments,
military, corporations, financial institutions, hospitals and private businesses amass a great deal
of confidential information about their employees, customers, products, research and financial
status. Most of this information is now collected, processed and stored on electronic computers
and transmitted across networks to other computers.
Implementing a Information Security System:
With so many different ways and so much potential for breaches to information security
systems, companies must establish a control system to strengthen the security of its information.
There are seven basic tenets that help strengthen the security of company information systems.
The following seven procedures are imperative to establishing an effective information security
system:
1. Educating employees
2. Establishing quality internal controls
3. Establishing a board of directors and its appointees
4. Establishing a compliant system
5. Establishing an independent audit of the system
6. Developing a structure of accountability
7. Establishing a budget for the information security system;
The Future of Information Security:
The days of “basic firewalls” and basic detection systems to secure information are over.
Viruses, manipulation of data, phishing scams, and even Trojan Horses are just some of the
threats facing information security systems today. In spite of the financial restrictions facing
companies in the present economic environment, information security is not the place that leaves
room to cut corners. Information is one of a company's most precise assets. Security threats of
information systems can have adverse effects on the reputation, status, and overall viability of a
business. Therefore, companies must ensure that they implement an information security system
that is accountable, verifiable, and as dynamic as the business environment in which they seek a
competitive advantage. Those companies abandon the security of their information will
inevitably find themselves at a decided disadvantage to their competitors.

More Related Content

Similar to How to secure information systemsSolutionAnswerInformation.pdf

Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxtodd581
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxglendar3
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdfZahid Hussain
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 

Similar to How to secure information systemsSolutionAnswerInformation.pdf (20)

Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdf
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 

More from rohit219406

Below are the transactions and adjustments that occurred during the .pdf
Below are the transactions and adjustments that occurred during the .pdfBelow are the transactions and adjustments that occurred during the .pdf
Below are the transactions and adjustments that occurred during the .pdfrohit219406
 
Help Please. Results not given Explain how your results for the pe.pdf
Help Please. Results not given Explain how your results for the pe.pdfHelp Please. Results not given Explain how your results for the pe.pdf
Help Please. Results not given Explain how your results for the pe.pdfrohit219406
 
As a software developer you have been delegated with the assignment .pdf
As a software developer you have been delegated with the assignment .pdfAs a software developer you have been delegated with the assignment .pdf
As a software developer you have been delegated with the assignment .pdfrohit219406
 
What scientist is credited with proposing the equivalency of mass and.pdf
What scientist is credited with proposing the equivalency of mass and.pdfWhat scientist is credited with proposing the equivalency of mass and.pdf
What scientist is credited with proposing the equivalency of mass and.pdfrohit219406
 
Why do countries with high GNI and GDP are attractive for foreign in.pdf
Why do countries with high GNI and GDP are attractive for foreign in.pdfWhy do countries with high GNI and GDP are attractive for foreign in.pdf
Why do countries with high GNI and GDP are attractive for foreign in.pdfrohit219406
 
Which of the following is NOT true about the ESCBA.It acts as an.pdf
Which of the following is NOT true about the ESCBA.It acts as an.pdfWhich of the following is NOT true about the ESCBA.It acts as an.pdf
Which of the following is NOT true about the ESCBA.It acts as an.pdfrohit219406
 
What is 4 -4 + infinity - infinity As x approaches 3 from th.pdf
What is  4  -4  + infinity  - infinity  As x approaches 3 from th.pdfWhat is  4  -4  + infinity  - infinity  As x approaches 3 from th.pdf
What is 4 -4 + infinity - infinity As x approaches 3 from th.pdfrohit219406
 
Use what you have learned so far to bring variety in your writing. U.pdf
Use what you have learned so far to bring variety in your writing. U.pdfUse what you have learned so far to bring variety in your writing. U.pdf
Use what you have learned so far to bring variety in your writing. U.pdfrohit219406
 
Use C programmingMake sure everything works only uploadSol.pdf
Use C programmingMake sure everything works only uploadSol.pdfUse C programmingMake sure everything works only uploadSol.pdf
Use C programmingMake sure everything works only uploadSol.pdfrohit219406
 
Thoroughly describe the molecular underpinnings of ONE and only one.pdf
Thoroughly describe the molecular underpinnings of ONE and only one.pdfThoroughly describe the molecular underpinnings of ONE and only one.pdf
Thoroughly describe the molecular underpinnings of ONE and only one.pdfrohit219406
 
The Blackbeard Company Ltd provided the following information in reg.pdf
The Blackbeard Company Ltd provided the following information in reg.pdfThe Blackbeard Company Ltd provided the following information in reg.pdf
The Blackbeard Company Ltd provided the following information in reg.pdfrohit219406
 
Thank you 1. What is responsible for anteriorposterior axis formati.pdf
Thank you 1. What is responsible for anteriorposterior axis formati.pdfThank you 1. What is responsible for anteriorposterior axis formati.pdf
Thank you 1. What is responsible for anteriorposterior axis formati.pdfrohit219406
 
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdf
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdfTake the basic Hardy-Weinberg Equilibrium equation, where there are a.pdf
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdfrohit219406
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfrohit219406
 
Step 1. Read critically and analyze the following scenarioGeraldi.pdf
Step 1. Read critically and analyze the following scenarioGeraldi.pdfStep 1. Read critically and analyze the following scenarioGeraldi.pdf
Step 1. Read critically and analyze the following scenarioGeraldi.pdfrohit219406
 
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdf
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdfQuestion 3 2 pts In response to the Great Recession, the Federal Rese.pdf
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdfrohit219406
 
Prove that the T_i -property is a topological property for i = 0S.pdf
Prove that the T_i -property is a topological property for i = 0S.pdfProve that the T_i -property is a topological property for i = 0S.pdf
Prove that the T_i -property is a topological property for i = 0S.pdfrohit219406
 
Q4.14. Which of the following species is most likely to exhibit pate.pdf
Q4.14. Which of the following species is most likely to exhibit pate.pdfQ4.14. Which of the following species is most likely to exhibit pate.pdf
Q4.14. Which of the following species is most likely to exhibit pate.pdfrohit219406
 
Prepare a classified balance sheet. Do not show the components that .pdf
Prepare a classified balance sheet. Do not show the components that .pdfPrepare a classified balance sheet. Do not show the components that .pdf
Prepare a classified balance sheet. Do not show the components that .pdfrohit219406
 
Microscopes and telescopes both consist of two converging lenses cont.pdf
Microscopes and telescopes both consist of two converging lenses cont.pdfMicroscopes and telescopes both consist of two converging lenses cont.pdf
Microscopes and telescopes both consist of two converging lenses cont.pdfrohit219406
 

More from rohit219406 (20)

Below are the transactions and adjustments that occurred during the .pdf
Below are the transactions and adjustments that occurred during the .pdfBelow are the transactions and adjustments that occurred during the .pdf
Below are the transactions and adjustments that occurred during the .pdf
 
Help Please. Results not given Explain how your results for the pe.pdf
Help Please. Results not given Explain how your results for the pe.pdfHelp Please. Results not given Explain how your results for the pe.pdf
Help Please. Results not given Explain how your results for the pe.pdf
 
As a software developer you have been delegated with the assignment .pdf
As a software developer you have been delegated with the assignment .pdfAs a software developer you have been delegated with the assignment .pdf
As a software developer you have been delegated with the assignment .pdf
 
What scientist is credited with proposing the equivalency of mass and.pdf
What scientist is credited with proposing the equivalency of mass and.pdfWhat scientist is credited with proposing the equivalency of mass and.pdf
What scientist is credited with proposing the equivalency of mass and.pdf
 
Why do countries with high GNI and GDP are attractive for foreign in.pdf
Why do countries with high GNI and GDP are attractive for foreign in.pdfWhy do countries with high GNI and GDP are attractive for foreign in.pdf
Why do countries with high GNI and GDP are attractive for foreign in.pdf
 
Which of the following is NOT true about the ESCBA.It acts as an.pdf
Which of the following is NOT true about the ESCBA.It acts as an.pdfWhich of the following is NOT true about the ESCBA.It acts as an.pdf
Which of the following is NOT true about the ESCBA.It acts as an.pdf
 
What is 4 -4 + infinity - infinity As x approaches 3 from th.pdf
What is  4  -4  + infinity  - infinity  As x approaches 3 from th.pdfWhat is  4  -4  + infinity  - infinity  As x approaches 3 from th.pdf
What is 4 -4 + infinity - infinity As x approaches 3 from th.pdf
 
Use what you have learned so far to bring variety in your writing. U.pdf
Use what you have learned so far to bring variety in your writing. U.pdfUse what you have learned so far to bring variety in your writing. U.pdf
Use what you have learned so far to bring variety in your writing. U.pdf
 
Use C programmingMake sure everything works only uploadSol.pdf
Use C programmingMake sure everything works only uploadSol.pdfUse C programmingMake sure everything works only uploadSol.pdf
Use C programmingMake sure everything works only uploadSol.pdf
 
Thoroughly describe the molecular underpinnings of ONE and only one.pdf
Thoroughly describe the molecular underpinnings of ONE and only one.pdfThoroughly describe the molecular underpinnings of ONE and only one.pdf
Thoroughly describe the molecular underpinnings of ONE and only one.pdf
 
The Blackbeard Company Ltd provided the following information in reg.pdf
The Blackbeard Company Ltd provided the following information in reg.pdfThe Blackbeard Company Ltd provided the following information in reg.pdf
The Blackbeard Company Ltd provided the following information in reg.pdf
 
Thank you 1. What is responsible for anteriorposterior axis formati.pdf
Thank you 1. What is responsible for anteriorposterior axis formati.pdfThank you 1. What is responsible for anteriorposterior axis formati.pdf
Thank you 1. What is responsible for anteriorposterior axis formati.pdf
 
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdf
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdfTake the basic Hardy-Weinberg Equilibrium equation, where there are a.pdf
Take the basic Hardy-Weinberg Equilibrium equation, where there are a.pdf
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdf
 
Step 1. Read critically and analyze the following scenarioGeraldi.pdf
Step 1. Read critically and analyze the following scenarioGeraldi.pdfStep 1. Read critically and analyze the following scenarioGeraldi.pdf
Step 1. Read critically and analyze the following scenarioGeraldi.pdf
 
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdf
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdfQuestion 3 2 pts In response to the Great Recession, the Federal Rese.pdf
Question 3 2 pts In response to the Great Recession, the Federal Rese.pdf
 
Prove that the T_i -property is a topological property for i = 0S.pdf
Prove that the T_i -property is a topological property for i = 0S.pdfProve that the T_i -property is a topological property for i = 0S.pdf
Prove that the T_i -property is a topological property for i = 0S.pdf
 
Q4.14. Which of the following species is most likely to exhibit pate.pdf
Q4.14. Which of the following species is most likely to exhibit pate.pdfQ4.14. Which of the following species is most likely to exhibit pate.pdf
Q4.14. Which of the following species is most likely to exhibit pate.pdf
 
Prepare a classified balance sheet. Do not show the components that .pdf
Prepare a classified balance sheet. Do not show the components that .pdfPrepare a classified balance sheet. Do not show the components that .pdf
Prepare a classified balance sheet. Do not show the components that .pdf
 
Microscopes and telescopes both consist of two converging lenses cont.pdf
Microscopes and telescopes both consist of two converging lenses cont.pdfMicroscopes and telescopes both consist of two converging lenses cont.pdf
Microscopes and telescopes both consist of two converging lenses cont.pdf
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

How to secure information systemsSolutionAnswerInformation.pdf

  • 1. How to secure information systems? Solution Answer: Information security: Information security, sometimes shortened to InfoSec, is the practice of halting unauthorized access, use, revelation, disordering, modification, investigation, recording or destruction of information. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Since the advent of the internet and increased expansion of computer based technology in today's corporations, information security breaches have increased at an alarming rate. While businesses take a more cautious approach to how they handle IT security threats, these are becoming increasingly complex and sophisticated. Denial-of-service attacks, software tampering (e.g. Trojan horses and computer viruses) and social engineering techniques (e.g. phishing) are some examples becoming prevalent. While we often times hear of the more widely publicized embezzlement, money laundering, burglary and bribery statistics, data has shown that companies have seen greater losses from losses attributed to information security breaches. One of the most effective ways to prevent criminals from accessing and compromising confidential company information is to implement an effective information security plan and properly train firm employees accessing the system. Additionally, companies should implement a dynamic and independent third party auditor to frequently test the adequacy of their security system. Lastly, key responsibilities within the information security chain should be segregated and rotated frequently. If companies follow these three basic tenets, they will be one step closer to the effective security of their information. Threats to Information Systems: Information security threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information infiltration Some of the most prevalent types of data infiltration include input manipulation, program manipulation, data input manipulation, data stealing, and outright sabotage. The most frequent type associated with this form of fraud is manipulation of the data. The reason for this most common is because the criminal requires the less amount of skill. Most people have experienced software attacks of some sort. Viruses, worms, phishing
  • 2. attacks, and Trojan horses are a few common examples of software attacks. Governments, military, corporations, financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Implementing a Information Security System: With so many different ways and so much potential for breaches to information security systems, companies must establish a control system to strengthen the security of its information. There are seven basic tenets that help strengthen the security of company information systems. The following seven procedures are imperative to establishing an effective information security system: 1. Educating employees 2. Establishing quality internal controls 3. Establishing a board of directors and its appointees 4. Establishing a compliant system 5. Establishing an independent audit of the system 6. Developing a structure of accountability 7. Establishing a budget for the information security system; The Future of Information Security: The days of “basic firewalls” and basic detection systems to secure information are over. Viruses, manipulation of data, phishing scams, and even Trojan Horses are just some of the threats facing information security systems today. In spite of the financial restrictions facing companies in the present economic environment, information security is not the place that leaves room to cut corners. Information is one of a company's most precise assets. Security threats of information systems can have adverse effects on the reputation, status, and overall viability of a business. Therefore, companies must ensure that they implement an information security system that is accountable, verifiable, and as dynamic as the business environment in which they seek a competitive advantage. Those companies abandon the security of their information will inevitably find themselves at a decided disadvantage to their competitors.